Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19/02/2024, 03:48
Static task
static1
Behavioral task
behavioral1
Sample
a40a1937177f72ee9eedb75f854460eb.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
a40a1937177f72ee9eedb75f854460eb.exe
Resource
win10v2004-20231215-en
General
-
Target
a40a1937177f72ee9eedb75f854460eb.exe
-
Size
49KB
-
MD5
a40a1937177f72ee9eedb75f854460eb
-
SHA1
2d60a2cd90f0711d4d942575b3e838225e7182a9
-
SHA256
f5787b6dc4284062043ee78f1eed5f8f3cd956e638f113c25af4960d8aeba4e4
-
SHA512
6eb873049c46dff62be5f146ac9cb687e4daddd2b5d4f31ebaf3dba6d03c9be50147fd84a07bc6de019f11bc148054222bb3f9b3d81622d0cebe12c31d20b18d
-
SSDEEP
1536:V6QFElP6n+gMQMOtEvwDpjeJQ7pojakll:V6a+pOtEvwDpj2
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation a40a1937177f72ee9eedb75f854460eb.exe -
Executes dropped EXE 1 IoCs
pid Process 3024 asih.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3156 wrote to memory of 3024 3156 a40a1937177f72ee9eedb75f854460eb.exe 85 PID 3156 wrote to memory of 3024 3156 a40a1937177f72ee9eedb75f854460eb.exe 85 PID 3156 wrote to memory of 3024 3156 a40a1937177f72ee9eedb75f854460eb.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\a40a1937177f72ee9eedb75f854460eb.exe"C:\Users\Admin\AppData\Local\Temp\a40a1937177f72ee9eedb75f854460eb.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3156 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:3024
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
49KB
MD5e4385655c064245a8f704aa181b418b6
SHA131f4f3a240d50062f110bda38ec89689b367d056
SHA256d177e481a6b0575e71572bc364206e207c353c089eec5697fcda41515daa92d1
SHA512b275adc77fb80cac5494ec72792c0d0640f04479120ac969059d206e5d812755a21130af4aad05131cf440f93f726dfd9840f1890ca66e52176c0f8f072d437d